If someone steals an employee's password—through phishing, a data breach, or social engineering—they can walk straight into your systems without the second check. In 2023, an Indian textile export company lost ₹2.5 crore when attackers compromised an accountant's email password and diverted payments to fake vendor accounts; MFA would have blocked them at login. Customers and auditors increasingly demand MFA proof before giving you contracts or compliance certifications. Without it, you risk regulatory penalties under DPDP Act, failed customer audits, and operational shutdown if ransomware reaches your financial systems.
Find where your organisation is today. Be honest — the self-assessment is only useful if it reflects reality.
Absent
You walk in and employees log into email, accounting software, and servers using only a username and password. No second verification step exists anywhere, and there is no plan to add one.
Initial
You find that MFA is technically available in some systems (like Google Workspace or bank portals) but is disabled or optional; most employees do not use it. Only the owner or one person uses MFA as a personal habit, not as a business requirement.
Developing
MFA is mandatory for email and accounting software, and 60–70% of staff use it (often SMS OTP). Critical systems like servers or databases do not have MFA, and enforcement is spotty for remote or contract workers.
Defined
MFA is mandatory for all cloud applications (email, accounting, CRM, file storage) and email logins are enforced; about 80–90% of staff comply. Servers and databases have MFA for administrative access, but not for all systems, and you have a written policy requiring it.
Managed
All critical systems (email, accounting, file storage, servers, databases, VPN) require MFA; compliance is 95%+. You use a mix of OTP, authenticator apps, and hardware keys; you audit MFA usage monthly and investigate bypasses. You have a formal access policy and exceptions are documented.
Optimised
MFA is mandatory across all systems and all user types (employees, contractors, admins, API accounts). You use hardware security keys where possible, monitor MFA adoption in real-time via dashboards, and have zero-trust architecture that re-verifies identity on sensitive actions. Annual security review and staff training keep MFA strong; you track and trend MFA bypass attempts and blocked login threats.
| Step | What to Do | Who | Effort |
|---|---|---|---|
| 0 → 1 | Enable MFA on at least one critical system (email or cloud accounting tool); send staff a one-page guide on how to set up OTP on their phone or use the built-in authenticator app. | IT Admin or Business Owner (if no IT person) | 2–3 days |
| 1 → 2 | Make MFA mandatory for email and accounting software; send a deadline notice (30 days) and train staff in a team meeting or short video; audit who has complied after the deadline. | IT Admin with support from HR or Operations Manager | 1–2 weeks |
| 2 → 3 | Create a written access policy requiring MFA for all cloud and remote access; extend MFA to server/database admin accounts; set up a simple tracking sheet (or use your system's native audit log) to confirm compliance monthly. | IT Admin with input from Finance and Compliance (or external consultant if needed) | 2–4 weeks |
| 3 → 4 | Deploy hardware security keys (YubiKeys or similar) to all admins and finance staff; integrate MFA into your IT onboarding checklist; build a dashboard or automated report to track MFA status and flag non-compliance within 48 hours. | IT Admin with budget approval from management | 6–8 weeks |
| 4 → 5 | Implement conditional access rules (e.g., re-verify identity if login is from a new location or device); introduce MFA for API and service accounts; conduct annual penetration testing to verify MFA cannot be bypassed; update staff training and policy annually. | Senior IT staff (may need external security consultant) with CEO sign-off | Ongoing (quarterly policy review, semi-annual penetration tests) |
Documents and records that prove your maturity level.
- Screenshot or report from your email or accounting system showing MFA is enabled for all users (e.g., Microsoft 365 Admin Center MFA report or Google Workspace security settings)
- Written access control policy or procedure document that states which systems require MFA and how to set it up
- Monthly or quarterly MFA compliance audit report (e.g., a spreadsheet or system-generated log listing users and their MFA status)
- Training record or email (sent to staff) with instructions on how to enable MFA and which apps are approved (e.g., Google Authenticator, Microsoft Authenticator, Authy, YubiKey)
- Incident log or bypass exception document showing any cases where MFA was disabled, why, and when it was re-enabled
Prepare for these questions from customers or third-party reviewers.
- "Can you show me your policy on multi-factor authentication? Which systems require it, and which employee roles must use it?"
- "Walk me through how a new employee sets up MFA on their first day. Who trains them, and how do you verify they have completed it?"
- "What is your current MFA adoption rate? How many users have it enabled, and how do you track non-compliance?"
- "What happens if an employee loses their phone or their OTP app stops working? How do you handle account recovery without bypassing MFA entirely?"
- "Do you use MFA for administrative accounts, API keys, and service accounts, or only for end users? Can you show me evidence?"
| Purpose | Free Option | Paid Option |
|---|---|---|
| MFA for email and cloud apps (e.g., Gmail, Outlook, Microsoft 365, cloud accounting) | Google Authenticator, Microsoft Authenticator, Authy (free tier); built-in OTP in Gmail, Outlook, and most cloud providers | Microsoft 365 Conditional Access (included in E3 plan, ~₹2,000–4,000 per user/year); Okta (for multi-app SSO + MFA, ~₹10,000–20,000/month for small business) |
| Hardware security keys for admin and finance staff | None (hardware costs money) | YubiKey 5 (~₹4,000–5,000 per key); Google Titan Security Key (~₹4,500); Ledger Nano S (if using crypto-related systems, ~₹3,500–5,000) |
| MFA compliance tracking and audit logging | Native audit logs in Microsoft 365 or Google Workspace; open-source tools like GLPI or OCS Inventory (self-hosted, requires technical setup) | Okta System Log (~₹10,000+/month); JumpCloud (identity and device management, ~₹30–60 per user/year); BeyondTrust for privileged access (~₹15,000+/month) |
- Relying only on SMS OTP: SMS-based OTP can be intercepted by SIM swap attacks or smishing. Move to authenticator apps (Google Authenticator, Microsoft Authenticator) or hardware keys for high-risk accounts.
- Allowing users to disable or skip MFA: Employees often complain that MFA is inconvenient and try to bypass it; management then quietly disables it. Make it non-negotiable and invest in a recovery procedure (e.g., backup codes or a trusted admin reset) instead of allowing opt-out.
- No fallback plan when an employee loses their phone: If you do not have a backup MFA method (backup codes, recovery email, admin override), your staff will be locked out. Document a recovery procedure and test it quarterly.
- MFA for users but not for admins or API accounts: Attackers often target high-privilege accounts (database admins, API credentials) because one compromise gives wide access. Enforce MFA on all admins and service accounts without exception.
- Not auditing or tracking MFA adoption: You enable it but never check who has it on; non-compliance goes unnoticed for months. Set a simple monthly check (ask your IT vendor for a compliance report) and investigate gaps.
- Mixing MFA solutions across departments: Some use SMS, some use Google Authenticator, some have none. This creates confusion and support overhead. Pick one or two standard methods across the entire organization and document them in a policy.
| Standard | Relevant Section |
|---|---|
| DPDP Act 2023 | Section 8 (rights of data principals) and Schedule 2 (personal data protection obligations); MFA is a recognized safeguard for authentication and authorized access. |
| CERT-In 2022 | Direction 4: All information systems handling critical data shall implement MFA for remote access and privileged accounts. |
| ISO 27001:2022 | Annex A, Control 8.2.3 (Handling secret authentication information) and A.8.2.4 (Secure authentication); also aligns with A.8.3.2 (Use of privileged access rights). |
| NIST CSF 2.0 | Function PR.AC-1 (Access Control Policy) and PR.AC-7 (Access is restricted based on the principle of least privilege and users are provisioned with only the access necessary to perform assigned duties); MFA is a core mechanism. |
Ready to assess your organisation?
Answer all 191 questions and get your NIRMATA maturity score across all 12 pillars.
Start Free Self-Assessment →